This research aims to find out the relationship of risk behavior & job satisfaction for workers in the emergency program in the international relief agency (UNRWA) in the Gaza Strip and the level of each of them, and to achieve that we have been conducting research on the strength of "210" sample employees of the emergency program staff in the international relief agency in Gaza governorates, and try to answer the research questions the researcher through the use of measurements of risk behavior and job satisfaction are two of the researcher, The researcher has used several statistical methods to identify the validity and reliability of scales and access to research and interpretations of the results, and these methods: the mean, standard deviation and relative weight, Pearson correlation coefficient, test "t", scheffe test, variance and variance analysis bilateral analysis test (2 × 2), results showed that the level of risk-taking behavior is located at the average level of relative weight (68.5%), and job satisfaction level is at a good level relative weight (73.5%) among respondents, as well as the presence of a statistically significant relationship between job satisfaction and risk taking behavior in general, and the presence of statistically significant differences in the level of risk-taking behavior is attributable to gender, educational qualification, the nature of the profession, the workplace, and to maintain, and the lack of statistically significant differences in the level of risk-taking behavior attributed to marital status, years of experience, and the lack of statistically significant differences in the level of satisfaction differences career due to the variable gender, marital status, educational qualification, years of experience and the workplace, and the presence of significant differences in the level of job satisfaction differences due to the variable nature of the profession, the province, and the presence of the effect statistically significant interaction between gender "male, female" job satisfaction "low , high "after the distinctive capabilities of personal risk, while the results did not show statistically significant impact indicative of the rest of the dimensions of the total degree of risk taking behavior have, And the existence of the effect statistically significant interaction between qualification and job satisfaction "low, high," a motivated risk, while the results did not show significant influential statistically for the rest of the overall dimensions and the degree of risk taking behavior they have, and the presence of the effect statistically significant interaction between the nature of the profession and job satisfaction "low, high "Just risk decision-making, while the results did not show significant influential statistically for the rest of dimensions and the total score for the behavior of the risk they have, and the presence of the effect statistically significant interaction between the workplace and job satisfaction" low, high, "the dimensions accept the risk, and the motives of the risk, while not shown Results statistically significant effect on the rest of the dimensions of the total degree of risk taking behavior.
ntroduction. Finding a safe innate immune response stimulator is one of the greatest challenges facing immunologists and vaccine manufacturers. Gap statement. The role of sterile bacterial secretions (SBSs) of Pseudomonas aeruginosa in stimulating the innate immune response was not investigated previously. Aim. The comparative effect of SBSs and bacterial cells of P. aeruginosa isolates isolated from freshwater (PAE) and infected wounds (PAC) on the respiratory tract innate immune response. Methodology. Four test mice groups were instilled intranasally (i.n.) with 106 c.f.u of PAC, 106 c.f.u of PAE, SBS of PAC, and SBS of PAE. Two control groups were given i.n. either LB broth or PBS. Time-course changes in IL-1 beta mRNA, TNF-alpha mRNA, I
... Show MoreObjective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy
... Show MoreIn a world where tourism has become the leading industry on the market, sustainable tourism has found its place and is becoming a major player in the network of traveling Internet users. Hospitality, solidarity and conviviality are essential are giving meaning to sharing. This “extra soul” has the capacity to enrich moments, places, attractions and heritage. Archaeological heritage sites constitute an important factor for the economic and social life of a large number of countries, the development policy came to emphasize the safeguard and the preservation of landscapes and natural or man-made sites, against the attacks which have impoverished the cultural heritage, this heritage
Background: Deep vein thrombosis is a multi causal disease and its one of most common venous disorder, but only one quarter of the patients who have signs and symptoms of a clot in the vein actually have thrombosis and need treatment .The disease can be difficult to diagnose. Venous ultrasound in combination with clinical finding is accurate for venous thromboembolism, its costly because a large number of patients with suspicious signs and symptoms. Venography still the gold standard for venous thromboembolism but it is invasive. The D-dimer increasingly is being seen as valuable tool rolling out venous thromboembolism and sparing low risk patients for further workup.Objectives: this study has designed the role of D-dimer to confirm diag
... Show MoreThe aim of this study is to compare and contrast the science process skills (SPS) included in the 10th-12th grade physics textbooks content utilized in Yemeni schools. The study revealed weaknesses and strengths in the textbooks’ content. For instance, a number of science process skills (SPS), such as measuring, predicting and hypothesizing, have been neglected in the 11th grade textbook. For all three textbooks content, the maximum percentage of basic science process skills (BSPS) was devoted to observation. However, the maximum percentage of integrated science process skills (ISPS) was different for each grade: experimenting had the highest percentage for 10th grade, interpreting data for 11th grade, and operational definitions for 12th
... Show MoreIn the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More